A computer includes a housing, a processor positioned in the housing, and an external bus adapter configured to allow the processor to access consumer electronics devices positioned outside of the housing using an external bus. The processor is configured to produce a first digital audio signal, to ...

In a computer network including a plurality of interconnected computers, one of the computers being a sleeping computer in a power down state, the sleeping computer having a list of packets to listen for stored on a network interface card associated with the sleeping computer, a method of waking the ...

An improved compressed file system is provided. In a preferred embodiment of the present invention, a memory cache is used for storing uncompressed data that is sent to or received from a compressed logical drive. When writing data to the compressed logical drive, the preferred embodiment of the pre ...

The present invention is directed to a facility for performing selected operations as part of a booting process of a computer system only during iterations of the booting process that immediately follow failed iterations of the booting process. At the beginning of the booting process, the facility c ...

This document describes tools capable of making a portion of operating-system memory associated with a protection agent unalterable or inaccessible from an operating-system privilege mode. In some embodiments, these tools are capable of creating a protection-agent privilege mode by requesting that a ...

An improved compressed file system is provided. In a preferred embodiment of the present invention, a memory cache is used for storing uncompressed data that is sent to or received from a compressed logical drive. When writing data to the compressed logical drive, the preferred embodiment of the pre ...

This document describes tools capable of enabling a protection agent to determine, from memory inaccessible from an operating-system privilege mode, whether one or more resources of an operating system have been modified. In some instances, these tools may enable the protection agent to reside withi ...

This document describes tools capable of enabling a protection agent to determine, from memory inaccessible from an operating-system privilege mode, whether one or more resources of an operating system have been modified. In some instances, these tools may enable the protection agent to reside withi ...